SlideShare a Scribd company logo
The Sophisticated Attack Myth:
Hiding Unsophisticated Security
Programs
Applying the Irari Rules
IraWinkler, CISSP
ira@securementem.com
+1-443-603-0200
AraceliTreu Gomes
ari@securementem.com
+1-443-603-0200
Preamble
The Media loves a good story, and we give them
what they want
– Spoon-feed it to them
– Want to know who is responsible for attacks
– Confuse the “who” with the “how”
– We love a bad drama
– We love a good conspiracy!
2
Why This Matters to Us
• It destroys our focus
• It changes the story
• It asks questions that shouldn’t be asked
• It deflects blame
– Bad security vs unstoppable enemy
• “If the top organizations can be hit, there is no
way anyone will expect us to stop the attacks”
3
The Question That Should Be Asked
Was it really a “sophisticated” attack, or
just bad security?
4
The Proclaimed “Sophisticated
Attacks”
• Sony
• Target
• CENTCOM
• You name it, it’s sophisticated according to
someone
5
It Can Also Help You
• It gets people talking about security
• Use the narrative to help your cause
– If management is concerned about the hype, use
it
• Highlighting the common vulnerabilities
exploited during attacks can get you funding
to mitigate similar vulnerabilities
• Stating how your security would have stopped
the attacks would give you kudos
6
Looking at Target
• Went in through phishing message to vendor
• Worked through vendor network to
compromise business network
• Identified targeted systems
• Set up exfiltration servers
• Exfiltrated data
• Went undetected
7
Sophisticated?
• Attackers were disciplined
• Attackers were persistent
• Preventable? HELL NO!
– Network monitoring tools ignored
– Phishing messages expected
– Improper network segmentation
– Lack of whitelisting on POSs
– No monitoring
– Etc.
8
Examining Sony
• Attackers were North Korean
– Get over it
• Likely spearphishing attack
• Used credentials in established malware
• Accessed critical systems with credentials
• Destroyed key systems
• Downloaded lots of data
9
Sophisticated?
• Attackers were fairly disciplined
• Attackers were very good at getting in the
network
• Preventable: HELL NO!
– Malware should have been detected
– No multifactor authentication
– Passwords were static
– Etc.
10
CENTCOM
• The world was talking about how advanced
ISIS was
• The media questioned the security of US
Government systems and classified data
• Politicians were horrified and wanted answers
• It was their Twitter feed
• It was their YouTube feed
11
Sophisticated?
• It does take some work to figure out who has
access to the accounts
• But again, it was likely a spearphishing attack,
or more likely an easily guessed password
• From there it was just a free-for-all
12
IRS Breach
• 104,000 records compromised through Get Transcript
function
– 200,000 attempted breaches
• Compromised authentication scheme
• Required “information on the taxpayer had”
– Hmmmm….
• Criminal downloaded records, filed false tax returns
– Stole $50 Million
• IRS Commissioner said it couldn’t be stopped citing
– Smart criminals with lots of advanced computers, hiring
smart people
– OMG
13
Sophisticated?
• All the criminals needed was credit reports
• IRS used commercial system that asked
questions with answers available through
credit reports
• Went undetected for 200,000 relatively
intensive attempts
14
Preventing the Target Attack
• Management who knew not to ignore
network monitoring tools
• Warnings to vendors
• Proper segmentation of business networks
• Configuration monitoring
• Whitelisting
• Better monitoring
Should any of this not have been in place?
15
Preventing the Sony Attack
• Multifactor authentication for admin accounts
• Changing admin passwords on a periodic basis
• Network monitoring for unusual activity
• Anti-malware tools in place
• DLP for critical files…like movies
16
Preventing the CENTCOM Attack
• Better passwords
• Multifactor authentication
17
Preventing the IRS Attack
• Frankly authentication might not be feasible
to strengthen
• Better detection
• IP analysis
• Rapid increase in requests
• Etc
• Focus on misuse detection
18
The Common Threads
• Lack of multifactor authentication
• Poor or lack of network monitoring
• Poor user awareness
• Poorly configured access controls
• Lack of or outdated anti-malware
• No DLP
19
A REAL “SOPHISTICATED” ATTACK
20
The Equation Group
• Supposedly NSA TAO
• Exploited multiple 0-Day
vulnerabilities
• Installed pre-delivery
• Undetectable, even if you
know to look for it
• Required reverse
engineering of hard
drives
• Targeted specific users and
systems
• Hundreds of Command & Control
servers
• Multiplatform malware
• Designed to bridge air gaps
• Went undetected for 14 years
WHAT CONSTITUTES A
“SOPHISTICATED” ATTACK?
You Know It When You See It
• It’s like pornography
• It is complicated
• It can’t be stopped with security countermeasures that
“Should” be in place
• Methods are what make attacks sophisticated
• It is not based upon the damage or results
• It is not based upon the “persistence” of the attacker
– APT attacks are persistent, but not necessarily
sophisticated
• It is easier to say what is NOT “Sophisticated”
THE IRARI RULES:
IT IS NOT A SOPHISTICATED ATTACK IF…
24
…The Attack Began With A
Phishing Message
• There are limited advanced techniques against people
• Stupidity/Ignorance doesn’t take a lot to exploit
• The “Stupidity” is often on the part of the security
team for assuming Common Knowledge (common
sense?) among users
• The default cause is that awareness programs are
insufficient
• For a phishing message to be successful, it has to go
through many layers of security countermeasures, not
just a user
– Refer to Ira’s other presentation on the phishing kill chain
…The Malware Used Should Have Been
Detected
• Too many attacks, such as Sony, used known
malware
• The failure to detect known malware is a sign
of a poor security program
• There really isn’t much more to discuss
• Sadly, this needs to be said
26
…Passwords Were Likely Guessed
• Easily guessed passwords are way too
common
• Usually results from account access being
shared or poor security policies
• Again, this is just indicative of a poor security
program
27
…User Awareness Exploited With
Poor Awareness Program In Place
• CBT is not an awareness program, it is training
• Phishing simulations are not awareness
programs, they are usually teaching people to
detect simulated phishes
28
…Known Vulnerabilities Were
Exploited
• If a known vulnerability was exploited, the attack
could have been prevented, and likely should
have been prevented…
– It is another indicator of a poor security program in
place
• If a string of known vulnerabilities were
exploited, the attack clearly could have been
prevented…
– Even if a patch was not available, other mitigations
can be put in place, such as turning off unnecessary
services and ports
29
…Multifactor Authentication Was
Not Used On Critical Systems
• Critical systems, and especially admin
accounts, should have this basic protection in
place
• Stops password reuse, bad passwords,
password sniffing, etc.
Props to JPMorgan Chase for acknowledging a recent hack resulted
from not having multifactor authentication in place
30
…Passwords Were Hardcoded Into
Malware
• Just like the Sony Attack
• It demonstrates that even if there is no
multifactor authentication, they don’t
regularly change passwords, which
demonstrates bad security programs
31
…Detection Mechanisms Were
Ignored Or Not In Place
• There should be IDS/IPS in place
• There should be DLP in place on critical systems
• There should be network monitoring in place
• You should see movies go out of your
organization
• You should see 100,000,000 credit cards go out of
your network
• If you’re not looking for that, shame on you
• Most important, you should not ignore the
warnings when they occur
32
…Poor Network Segmentation Was
In Place
• Vendor networks should not connect to POS
• Business networks should not be connected to
SCADA systems
• There should be a conscious network design in
place that incorporates risk, not just cost
33
…User Accounts Had Excessive
Privileges
• Low level account compromises should not
lead to critical data
• It demonstrates poor administrator
procedures
• Indicative of a poor security program in place
34
The Irari Rules of Sophisticated
Attacks
• Must not actualize because of a Phishing message
• Malware must have been undetectable
• Passwords were not easily guessed
• User awareness exploited with poor awareness program in place
• Known vulnerabilities cannot have been exploited
• Multifactor authentication in use on critical systems
• Passwords were not hardcoded into the systems
• Detection capability was in place and not ignored
• Proper network segmentation in place
• User accounts had minimum privileges
35
Conclusions
• They hype does impact our ability to be
effective
• Make use of the hype
• “How” dictates sophistication; “how” first,
“who” later
• Unsophisticated attack vectors tell you where
countermeasures are required
• If it happens to someone else, it is likely
happening to your organizations, so get
countermeasures in place quickly
36
For More Information
• ira@securementem.com
• +1-443-603-0200
• @irawinkler
• www.securementem.com
• www.linkedin.com/in/irawinkler
• Facebook.com/irawinkler
37
Ira Winkler, CISSP Araceli Treu Gomes,
Dozens of Certs
• ari@killchain.net
• @sleepdeficit_
• www.linkedin.com/in/sleep
deficit
• Facebook.com/sleepdeficit
• www.irarireport.com
• @irarireport.com

More Related Content

What's hot

Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
Madhusudhan G
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Vishesh Singhal
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basics
Meenesh Jain
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Mukul Agarwal
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Ganesh Vadulekar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Anumadil1
 
Computer Security
Computer SecurityComputer Security
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
S Sai Karthik
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Graeme Wood
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
Coder Tech
 
Hacking
HackingHacking
Hacking
VipinYadav257
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aryan Saxena
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
Xavier Mertens
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Harshit Upadhyay
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
BugRaptors
 
Hackers
HackersHackers
Hackers
Mahmoud Saeed
 

What's hot (20)

Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basics
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Hacking
HackingHacking
Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hackers
HackersHackers
Hackers
 

Similar to Irari rules

Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
Lancope, Inc.
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Rohan Raj
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
ssuser50c54b
 
How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!
AVG Technologies AU
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
MansoorAhmed57263
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
Stephen Cobb
 
Identify and Stop Insider Threats
Identify and Stop Insider ThreatsIdentify and Stop Insider Threats
Identify and Stop Insider Threats
Lancope, Inc.
 
Security is not a feature
Security is not a featureSecurity is not a feature
Security is not a feature
Elizabeth Smith
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
John Stauffacher
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
Infonaligy
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
 
Social engineering
Social engineeringSocial engineering
Social engineering
ankushmohanty
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
SecureAuth
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
Marta Barrio Marcos
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
Aravind R
 

Similar to Irari rules (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
 
How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
Identify and Stop Insider Threats
Identify and Stop Insider ThreatsIdentify and Stop Insider Threats
Identify and Stop Insider Threats
 
Security is not a feature
Security is not a featureSecurity is not a feature
Security is not a feature
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 

More from ISSA LA

Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenberg
ISSA LA
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.
ISSA LA
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604
ISSA LA
 
Technical track kevin cardwell-10-00 am-solid-defense
Technical track   kevin cardwell-10-00 am-solid-defenseTechnical track   kevin cardwell-10-00 am-solid-defense
Technical track kevin cardwell-10-00 am-solid-defense
ISSA LA
 
The savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_laThe savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_la
ISSA LA
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
ISSA LA
 
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
ISSA LA
 
Malcolm issa preso june 2015
Malcolm issa preso june 2015Malcolm issa preso june 2015
Malcolm issa preso june 2015
ISSA LA
 
La issa-2015-cyberwar-ranum
La issa-2015-cyberwar-ranumLa issa-2015-cyberwar-ranum
La issa-2015-cyberwar-ranum
ISSA LA
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mr
ISSA LA
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604
ISSA LA
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
ISSA LA
 
Issa healthcare panel
Issa healthcare panelIssa healthcare panel
Issa healthcare panel
ISSA LA
 
Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation
ISSA LA
 
Healthcare forum perry-david m-everything you know is wrong!
Healthcare forum perry-david m-everything you know is wrong!Healthcare forum perry-david m-everything you know is wrong!
Healthcare forum perry-david m-everything you know is wrong!
ISSA LA
 
Fssf breach-incident-table-top
Fssf breach-incident-table-topFssf breach-incident-table-top
Fssf breach-incident-table-top
ISSA LA
 
Healthcare forum law enforcement panel prez
Healthcare forum law enforcement panel prezHealthcare forum law enforcement panel prez
Healthcare forum law enforcement panel prez
ISSA LA
 
Emerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovarEmerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovar
ISSA LA
 
Digital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collideDigital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collide
ISSA LA
 
Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015
ISSA LA
 

More from ISSA LA (20)

Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenberg
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604
 
Technical track kevin cardwell-10-00 am-solid-defense
Technical track   kevin cardwell-10-00 am-solid-defenseTechnical track   kevin cardwell-10-00 am-solid-defense
Technical track kevin cardwell-10-00 am-solid-defense
 
The savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_laThe savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_la
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
 
Malcolm issa preso june 2015
Malcolm issa preso june 2015Malcolm issa preso june 2015
Malcolm issa preso june 2015
 
La issa-2015-cyberwar-ranum
La issa-2015-cyberwar-ranumLa issa-2015-cyberwar-ranum
La issa-2015-cyberwar-ranum
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mr
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
 
Issa healthcare panel
Issa healthcare panelIssa healthcare panel
Issa healthcare panel
 
Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation
 
Healthcare forum perry-david m-everything you know is wrong!
Healthcare forum perry-david m-everything you know is wrong!Healthcare forum perry-david m-everything you know is wrong!
Healthcare forum perry-david m-everything you know is wrong!
 
Fssf breach-incident-table-top
Fssf breach-incident-table-topFssf breach-incident-table-top
Fssf breach-incident-table-top
 
Healthcare forum law enforcement panel prez
Healthcare forum law enforcement panel prezHealthcare forum law enforcement panel prez
Healthcare forum law enforcement panel prez
 
Emerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovarEmerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovar
 
Digital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collideDigital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collide
 
Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015
 

Irari rules

  • 1. The Sophisticated Attack Myth: Hiding Unsophisticated Security Programs Applying the Irari Rules IraWinkler, CISSP ira@securementem.com +1-443-603-0200 AraceliTreu Gomes ari@securementem.com +1-443-603-0200
  • 2. Preamble The Media loves a good story, and we give them what they want – Spoon-feed it to them – Want to know who is responsible for attacks – Confuse the “who” with the “how” – We love a bad drama – We love a good conspiracy! 2
  • 3. Why This Matters to Us • It destroys our focus • It changes the story • It asks questions that shouldn’t be asked • It deflects blame – Bad security vs unstoppable enemy • “If the top organizations can be hit, there is no way anyone will expect us to stop the attacks” 3
  • 4. The Question That Should Be Asked Was it really a “sophisticated” attack, or just bad security? 4
  • 5. The Proclaimed “Sophisticated Attacks” • Sony • Target • CENTCOM • You name it, it’s sophisticated according to someone 5
  • 6. It Can Also Help You • It gets people talking about security • Use the narrative to help your cause – If management is concerned about the hype, use it • Highlighting the common vulnerabilities exploited during attacks can get you funding to mitigate similar vulnerabilities • Stating how your security would have stopped the attacks would give you kudos 6
  • 7. Looking at Target • Went in through phishing message to vendor • Worked through vendor network to compromise business network • Identified targeted systems • Set up exfiltration servers • Exfiltrated data • Went undetected 7
  • 8. Sophisticated? • Attackers were disciplined • Attackers were persistent • Preventable? HELL NO! – Network monitoring tools ignored – Phishing messages expected – Improper network segmentation – Lack of whitelisting on POSs – No monitoring – Etc. 8
  • 9. Examining Sony • Attackers were North Korean – Get over it • Likely spearphishing attack • Used credentials in established malware • Accessed critical systems with credentials • Destroyed key systems • Downloaded lots of data 9
  • 10. Sophisticated? • Attackers were fairly disciplined • Attackers were very good at getting in the network • Preventable: HELL NO! – Malware should have been detected – No multifactor authentication – Passwords were static – Etc. 10
  • 11. CENTCOM • The world was talking about how advanced ISIS was • The media questioned the security of US Government systems and classified data • Politicians were horrified and wanted answers • It was their Twitter feed • It was their YouTube feed 11
  • 12. Sophisticated? • It does take some work to figure out who has access to the accounts • But again, it was likely a spearphishing attack, or more likely an easily guessed password • From there it was just a free-for-all 12
  • 13. IRS Breach • 104,000 records compromised through Get Transcript function – 200,000 attempted breaches • Compromised authentication scheme • Required “information on the taxpayer had” – Hmmmm…. • Criminal downloaded records, filed false tax returns – Stole $50 Million • IRS Commissioner said it couldn’t be stopped citing – Smart criminals with lots of advanced computers, hiring smart people – OMG 13
  • 14. Sophisticated? • All the criminals needed was credit reports • IRS used commercial system that asked questions with answers available through credit reports • Went undetected for 200,000 relatively intensive attempts 14
  • 15. Preventing the Target Attack • Management who knew not to ignore network monitoring tools • Warnings to vendors • Proper segmentation of business networks • Configuration monitoring • Whitelisting • Better monitoring Should any of this not have been in place? 15
  • 16. Preventing the Sony Attack • Multifactor authentication for admin accounts • Changing admin passwords on a periodic basis • Network monitoring for unusual activity • Anti-malware tools in place • DLP for critical files…like movies 16
  • 17. Preventing the CENTCOM Attack • Better passwords • Multifactor authentication 17
  • 18. Preventing the IRS Attack • Frankly authentication might not be feasible to strengthen • Better detection • IP analysis • Rapid increase in requests • Etc • Focus on misuse detection 18
  • 19. The Common Threads • Lack of multifactor authentication • Poor or lack of network monitoring • Poor user awareness • Poorly configured access controls • Lack of or outdated anti-malware • No DLP 19
  • 21. The Equation Group • Supposedly NSA TAO • Exploited multiple 0-Day vulnerabilities • Installed pre-delivery • Undetectable, even if you know to look for it • Required reverse engineering of hard drives • Targeted specific users and systems • Hundreds of Command & Control servers • Multiplatform malware • Designed to bridge air gaps • Went undetected for 14 years
  • 23. You Know It When You See It • It’s like pornography • It is complicated • It can’t be stopped with security countermeasures that “Should” be in place • Methods are what make attacks sophisticated • It is not based upon the damage or results • It is not based upon the “persistence” of the attacker – APT attacks are persistent, but not necessarily sophisticated • It is easier to say what is NOT “Sophisticated”
  • 24. THE IRARI RULES: IT IS NOT A SOPHISTICATED ATTACK IF… 24
  • 25. …The Attack Began With A Phishing Message • There are limited advanced techniques against people • Stupidity/Ignorance doesn’t take a lot to exploit • The “Stupidity” is often on the part of the security team for assuming Common Knowledge (common sense?) among users • The default cause is that awareness programs are insufficient • For a phishing message to be successful, it has to go through many layers of security countermeasures, not just a user – Refer to Ira’s other presentation on the phishing kill chain
  • 26. …The Malware Used Should Have Been Detected • Too many attacks, such as Sony, used known malware • The failure to detect known malware is a sign of a poor security program • There really isn’t much more to discuss • Sadly, this needs to be said 26
  • 27. …Passwords Were Likely Guessed • Easily guessed passwords are way too common • Usually results from account access being shared or poor security policies • Again, this is just indicative of a poor security program 27
  • 28. …User Awareness Exploited With Poor Awareness Program In Place • CBT is not an awareness program, it is training • Phishing simulations are not awareness programs, they are usually teaching people to detect simulated phishes 28
  • 29. …Known Vulnerabilities Were Exploited • If a known vulnerability was exploited, the attack could have been prevented, and likely should have been prevented… – It is another indicator of a poor security program in place • If a string of known vulnerabilities were exploited, the attack clearly could have been prevented… – Even if a patch was not available, other mitigations can be put in place, such as turning off unnecessary services and ports 29
  • 30. …Multifactor Authentication Was Not Used On Critical Systems • Critical systems, and especially admin accounts, should have this basic protection in place • Stops password reuse, bad passwords, password sniffing, etc. Props to JPMorgan Chase for acknowledging a recent hack resulted from not having multifactor authentication in place 30
  • 31. …Passwords Were Hardcoded Into Malware • Just like the Sony Attack • It demonstrates that even if there is no multifactor authentication, they don’t regularly change passwords, which demonstrates bad security programs 31
  • 32. …Detection Mechanisms Were Ignored Or Not In Place • There should be IDS/IPS in place • There should be DLP in place on critical systems • There should be network monitoring in place • You should see movies go out of your organization • You should see 100,000,000 credit cards go out of your network • If you’re not looking for that, shame on you • Most important, you should not ignore the warnings when they occur 32
  • 33. …Poor Network Segmentation Was In Place • Vendor networks should not connect to POS • Business networks should not be connected to SCADA systems • There should be a conscious network design in place that incorporates risk, not just cost 33
  • 34. …User Accounts Had Excessive Privileges • Low level account compromises should not lead to critical data • It demonstrates poor administrator procedures • Indicative of a poor security program in place 34
  • 35. The Irari Rules of Sophisticated Attacks • Must not actualize because of a Phishing message • Malware must have been undetectable • Passwords were not easily guessed • User awareness exploited with poor awareness program in place • Known vulnerabilities cannot have been exploited • Multifactor authentication in use on critical systems • Passwords were not hardcoded into the systems • Detection capability was in place and not ignored • Proper network segmentation in place • User accounts had minimum privileges 35
  • 36. Conclusions • They hype does impact our ability to be effective • Make use of the hype • “How” dictates sophistication; “how” first, “who” later • Unsophisticated attack vectors tell you where countermeasures are required • If it happens to someone else, it is likely happening to your organizations, so get countermeasures in place quickly 36
  • 37. For More Information • ira@securementem.com • +1-443-603-0200 • @irawinkler • www.securementem.com • www.linkedin.com/in/irawinkler • Facebook.com/irawinkler 37 Ira Winkler, CISSP Araceli Treu Gomes, Dozens of Certs • ari@killchain.net • @sleepdeficit_ • www.linkedin.com/in/sleep deficit • Facebook.com/sleepdeficit • www.irarireport.com • @irarireport.com